SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
How Corporate
Firewalls Work
 week14 WEB POSTER
       group E
   January 22, 2008
proxy server
Proxy Server (Proxy Server) is a substitute meaning, and it is a
representation server serving as interagency with a client and the objective
server.

When a client PC connects with the Internet, I receive an access demand,
and Proxy Server connects with a target server in the Internet as substitution
of the client, and it is the server which it carried a function to return the
information to a client on. It is installed on the inside (the LAN side) of a
physical firewall or a firewall in a company network and accesses a Web
server (or, server) of the Internet.

Proxy Server manages the Internet connection of the client PC 1 yuan
and admits connection, and it is used by unjust access from the outside to
protect an internal network. Sake to save information (data) that I reply to a
client PC as a merit with Proxy Server and am connected and acquired on a
physics disk of Proxy Server (I do cash), plural client PCs can contribute to
improvement of the speed of the Internet connection cash forwards a done
file, and to reply when I carried out the same access demand.
Proxy Server


In computer networks, a proxy server is a server which services the requests of its clients by
forwarding requests to other servers. A client connects to the proxy server, requesting some service,
such as a file, connection, web page, or other resource, available from a different server. The proxy
server provides the resource by connecting to the specified server and requesting the service on behalf
of the client. A proxy server may optionally alter the client's request or the server's response, and
sometimes it may serve the request without contacting the specified server. In this case, it would
'cache' the first request to the remote server, so it could save the information for later, and make
everything as fast as possible. A proxy server that passes all requests and replies unmodified is
usually called a gateway or sometimes tunneling proxy .A proxy server can be placed in the user's
local computer or at specific key points between the user and the destination servers or the Internet.
Risks
In using a proxy server, all data sent to the service being used must pass through the proxy server
before being sent to the service, mostly in unencrypted form. It is therefore possible, and has been
demonstrated, for a malicious proxy server to record everything sent to the proxy: including
unencrypted login and passwords.
By chaining proxies which do not reveal data about the original requester, it is possible to obfuscate
activities from the eyes of the user's destination. However, more traces will be left on the intermediate
hops, which could be used or offered up to trace the user's activities. If the policies and administrators
of these other proxies are unknown, the user may fall victim to a false sense of security just because
those details are out of sight and mind.
The bottom line of this is to be wary when using proxy servers, and only use proxy servers of known
integrity, and never use proxy servers of unknown integrity. If there is no choice but to use unknown
proxy servers, do not pass any private information through the proxy.
In what is more of an inconvenience than a risk, proxy users may find themselves being blocked from
certain Web sites, as numerous forums and Web sites block IP addresses from proxies known to have
spammed or trolled the site.
FTP
File Transfer Protocol (The file transfer protocol and abbreviation: FTP) is a c
ommunications protocol (protocol) to forward the file on the network.
In the protocol that exists since the Internet initial, it is one of the protoco
ls often still used by the Internet. On the protocol, it is usually used for for
warding between the client and the server connecting it though the file transfer
warding between the client and the server connecting it though the file transfer
 between arbitrary hosts can be done.
Anonymous (anonymity) FTP server that can be accessed by anonymity might be used
 to distribute the file (chiefly free, free software etc.) entirely though the a
ttestation is needed when connecting to the server usually. However, an anonymou
s access is necessary the attestation on the form, and, in this case, specifies
"Anonymous" or "Ftp" for a user. The password is usually good, and anything it h
as been made the specification of user's E-mail address for the server manager t
o contact when there is a wound in the distributed software manners (Withershins
, when it is clear, the domain in the mail address omits the domain from the pul
l etc. about Internet Protocol address of the client like "Foo@"). If the passwo
rd doesn't fill the form of the mail address according to the server, it is not
likely to be able to use it.
What is protocol?
In the communication of the computer mutually by the network,
they are sets of promised things decided mutually. It might be
called the communication procedure and the communications
protocol, etc.
It is possible to think dividing into two hierarchies which language
use when man communicates mutually, and transmitted by using
what kind of medium, and it thinks in the computer
communication dividing the role of the protocol into two or more
communications protocol, etc.
It is possible to think dividing into two hierarchies which language
use when man communicates mutually, and transmitted by using
what kind of medium, and it thinks in the computer




communication dividing the role of the protocol into two or more
hierarchies.it doesn't worry whether stay up of what in the under
from it at all and a high-ranking protocol (software that mounts)
can be communicated by hierarchizing it if it knows.
Firewalls Work
Firewalls make it possible to filter incoming and outgoing traffic that flows through your system. A
firewall can use one or more sets of “rules” to inspect the network packets as they come in or go out
of your network connections and either allows the traffic through or blocks it. The rules of a firewall
can inspect one or more characteristics of the packets, including but not limited to the protocol type,
the source or destination host address, and the source or destination port.

There are several classifications of firewalls depending on where the communication is taking place,
where the communication is intercepted and the state that is being traced.
*Network layer and packet filters,
*Application-layer,
*Proxies,
*Network address translation




REFERENCE

http://srd.yahoo.co.jp/IMG/r=1/ig=465x342/id=94894e2710642f4c/l=ri/da=g/tid=MMSI02_01/q=pro
xy%20server/SIG=11r2hkuao/EXP=1200987756/*-http%3A//www.inode.gr/img/proxy_small.jpg

http://ja.wikipedia.org/wiki/%E3%83%97%E3%83%AD%E3%82%AD%E3%82%B7

http://www.secomtrust.net/secword/proxyserver.html
http://img.zdnet.com/techDirectory/LAN2.GIF

http://ja.wikipedia.org/wiki/File_Transfer_Protocol
http://www.jnutella.org/docs/gnutella/Firewalls.html
http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/firewalls.html
http://e-words.jp/w/FTP.html

Weitere ähnliche Inhalte

Was ist angesagt?

Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
rahul kundu
 

Was ist angesagt? (19)

Protocol
ProtocolProtocol
Protocol
 
HTTP Basics
HTTP BasicsHTTP Basics
HTTP Basics
 
Web Terminology
Web TerminologyWeb Terminology
Web Terminology
 
Application layer and protocols of application layer
Application layer and protocols of application layerApplication layer and protocols of application layer
Application layer and protocols of application layer
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
 
If3614251429
If3614251429If3614251429
If3614251429
 
Web Proxy Server
Web Proxy ServerWeb Proxy Server
Web Proxy Server
 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
 
Let's go HTTPS
Let's go HTTPSLet's go HTTPS
Let's go HTTPS
 
Come ti "pusho" il web con WebSockets: da 0 a SignalR
Come ti "pusho" il web con WebSockets: da 0 a SignalR Come ti "pusho" il web con WebSockets: da 0 a SignalR
Come ti "pusho" il web con WebSockets: da 0 a SignalR
 
Proxy server
Proxy serverProxy server
Proxy server
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Http and its Applications
Http and its ApplicationsHttp and its Applications
Http and its Applications
 
Proxy
ProxyProxy
Proxy
 
Rest
RestRest
Rest
 
File Transfer Protocol (FTP)
File Transfer Protocol (FTP)File Transfer Protocol (FTP)
File Transfer Protocol (FTP)
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
 
HTTP
HTTPHTTP
HTTP
 
Application layer assignments
Application layer assignmentsApplication layer assignments
Application layer assignments
 

Andere mochten auch (14)

Pre Week13
Pre Week13Pre Week13
Pre Week13
 
AMM OCT 2009
AMM OCT 2009AMM OCT 2009
AMM OCT 2009
 
Revistedblogswikis2009 090701082505 Phpapp02
Revistedblogswikis2009 090701082505 Phpapp02Revistedblogswikis2009 090701082505 Phpapp02
Revistedblogswikis2009 090701082505 Phpapp02
 
AMM JUNE 2009
AMM JUNE 2009AMM JUNE 2009
AMM JUNE 2009
 
ICDT 2007
ICDT 2007ICDT 2007
ICDT 2007
 
AMM JANUARY 2009
AMM JANUARY 2009AMM JANUARY 2009
AMM JANUARY 2009
 
AMM SEPT 2009
AMM SEPT 2009AMM SEPT 2009
AMM SEPT 2009
 
AMM MAY 2009
AMM MAY 2009AMM MAY 2009
AMM MAY 2009
 
AMM NOV 2009
AMM NOV 2009AMM NOV 2009
AMM NOV 2009
 
Pre Week12
Pre Week12Pre Week12
Pre Week12
 
002 abdomen agudo
002 abdomen agudo002 abdomen agudo
002 abdomen agudo
 
AMM FEBRUARY 2009
AMM FEBRUARY 2009AMM FEBRUARY 2009
AMM FEBRUARY 2009
 
Vietnamese Youth Volunteer Organization
Vietnamese Youth Volunteer OrganizationVietnamese Youth Volunteer Organization
Vietnamese Youth Volunteer Organization
 
AMM APRIL 2009
AMM APRIL 2009AMM APRIL 2009
AMM APRIL 2009
 

Ähnlich wie Pre Week14

Group20 Dynamic Networks
Group20 Dynamic NetworksGroup20 Dynamic Networks
Group20 Dynamic Networks
hariprasadnr
 

Ähnlich wie Pre Week14 (20)

Proxy Server
Proxy ServerProxy Server
Proxy Server
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
 
Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https .
 
CN UNIT V.pptx
CN UNIT V.pptxCN UNIT V.pptx
CN UNIT V.pptx
 
Www and http
Www and httpWww and http
Www and http
 
Group20 Dynamic Networks
Group20 Dynamic NetworksGroup20 Dynamic Networks
Group20 Dynamic Networks
 
Cloud Computing Assignment 3
Cloud Computing Assignment 3Cloud Computing Assignment 3
Cloud Computing Assignment 3
 
Proxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive GuideProxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive Guide
 
Infrastructure security & Incident Management
Infrastructure security & Incident Management Infrastructure security & Incident Management
Infrastructure security & Incident Management
 
Information System Security
Information System Security Information System Security
Information System Security
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
New PPT Presentation.pptx
New PPT Presentation.pptxNew PPT Presentation.pptx
New PPT Presentation.pptx
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Network security
Network securityNetwork security
Network security
 
Proxies
ProxiesProxies
Proxies
 
Server and Its Types - Presentation
Server and Its Types - PresentationServer and Its Types - Presentation
Server and Its Types - Presentation
 
Proxies
ProxiesProxies
Proxies
 

Kürzlich hochgeladen

Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Dipal Arora
 

Kürzlich hochgeladen (20)

Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 

Pre Week14

  • 1. How Corporate Firewalls Work week14 WEB POSTER group E January 22, 2008
  • 2. proxy server Proxy Server (Proxy Server) is a substitute meaning, and it is a representation server serving as interagency with a client and the objective server. When a client PC connects with the Internet, I receive an access demand, and Proxy Server connects with a target server in the Internet as substitution of the client, and it is the server which it carried a function to return the information to a client on. It is installed on the inside (the LAN side) of a physical firewall or a firewall in a company network and accesses a Web server (or, server) of the Internet. Proxy Server manages the Internet connection of the client PC 1 yuan and admits connection, and it is used by unjust access from the outside to protect an internal network. Sake to save information (data) that I reply to a client PC as a merit with Proxy Server and am connected and acquired on a physics disk of Proxy Server (I do cash), plural client PCs can contribute to improvement of the speed of the Internet connection cash forwards a done file, and to reply when I carried out the same access demand.
  • 3. Proxy Server In computer networks, a proxy server is a server which services the requests of its clients by forwarding requests to other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server provides the resource by connecting to the specified server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it would 'cache' the first request to the remote server, so it could save the information for later, and make everything as fast as possible. A proxy server that passes all requests and replies unmodified is usually called a gateway or sometimes tunneling proxy .A proxy server can be placed in the user's local computer or at specific key points between the user and the destination servers or the Internet. Risks In using a proxy server, all data sent to the service being used must pass through the proxy server before being sent to the service, mostly in unencrypted form. It is therefore possible, and has been demonstrated, for a malicious proxy server to record everything sent to the proxy: including unencrypted login and passwords. By chaining proxies which do not reveal data about the original requester, it is possible to obfuscate activities from the eyes of the user's destination. However, more traces will be left on the intermediate hops, which could be used or offered up to trace the user's activities. If the policies and administrators of these other proxies are unknown, the user may fall victim to a false sense of security just because those details are out of sight and mind. The bottom line of this is to be wary when using proxy servers, and only use proxy servers of known integrity, and never use proxy servers of unknown integrity. If there is no choice but to use unknown proxy servers, do not pass any private information through the proxy. In what is more of an inconvenience than a risk, proxy users may find themselves being blocked from certain Web sites, as numerous forums and Web sites block IP addresses from proxies known to have spammed or trolled the site.
  • 4. FTP File Transfer Protocol (The file transfer protocol and abbreviation: FTP) is a c ommunications protocol (protocol) to forward the file on the network. In the protocol that exists since the Internet initial, it is one of the protoco ls often still used by the Internet. On the protocol, it is usually used for for warding between the client and the server connecting it though the file transfer warding between the client and the server connecting it though the file transfer between arbitrary hosts can be done. Anonymous (anonymity) FTP server that can be accessed by anonymity might be used to distribute the file (chiefly free, free software etc.) entirely though the a ttestation is needed when connecting to the server usually. However, an anonymou s access is necessary the attestation on the form, and, in this case, specifies "Anonymous" or "Ftp" for a user. The password is usually good, and anything it h as been made the specification of user's E-mail address for the server manager t o contact when there is a wound in the distributed software manners (Withershins , when it is clear, the domain in the mail address omits the domain from the pul l etc. about Internet Protocol address of the client like "Foo@"). If the passwo rd doesn't fill the form of the mail address according to the server, it is not likely to be able to use it.
  • 5. What is protocol? In the communication of the computer mutually by the network, they are sets of promised things decided mutually. It might be called the communication procedure and the communications protocol, etc. It is possible to think dividing into two hierarchies which language use when man communicates mutually, and transmitted by using what kind of medium, and it thinks in the computer communication dividing the role of the protocol into two or more communications protocol, etc. It is possible to think dividing into two hierarchies which language use when man communicates mutually, and transmitted by using what kind of medium, and it thinks in the computer communication dividing the role of the protocol into two or more hierarchies.it doesn't worry whether stay up of what in the under from it at all and a high-ranking protocol (software that mounts) can be communicated by hierarchizing it if it knows.
  • 6. Firewalls Work Firewalls make it possible to filter incoming and outgoing traffic that flows through your system. A firewall can use one or more sets of “rules” to inspect the network packets as they come in or go out of your network connections and either allows the traffic through or blocks it. The rules of a firewall can inspect one or more characteristics of the packets, including but not limited to the protocol type, the source or destination host address, and the source or destination port. There are several classifications of firewalls depending on where the communication is taking place, where the communication is intercepted and the state that is being traced. *Network layer and packet filters, *Application-layer, *Proxies, *Network address translation REFERENCE http://srd.yahoo.co.jp/IMG/r=1/ig=465x342/id=94894e2710642f4c/l=ri/da=g/tid=MMSI02_01/q=pro xy%20server/SIG=11r2hkuao/EXP=1200987756/*-http%3A//www.inode.gr/img/proxy_small.jpg http://ja.wikipedia.org/wiki/%E3%83%97%E3%83%AD%E3%82%AD%E3%82%B7 http://www.secomtrust.net/secword/proxyserver.html http://img.zdnet.com/techDirectory/LAN2.GIF http://ja.wikipedia.org/wiki/File_Transfer_Protocol http://www.jnutella.org/docs/gnutella/Firewalls.html http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/firewalls.html